[21376] in bugtraq

home help back first fref pref prev next nref lref last post

Re: poprelayd and sendmail relay authentication problem (Cobalt

daemon@ATHENA.MIT.EDU (Ram'on Reyes Carri'on)
Fri Jul 6 14:35:14 2001

Date: Fri, 6 Jul 2001 09:54:01 -0500 (CDT)
From: "Ram'on Reyes Carri'on" <ramon@cimat.mx>
To: bugtraq@securityfocus.com
Message-ID: <Pine.SOL.4.21.0107060949040.20706-100000@fractal.cimat.mx>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

Hi!

Yes it is true! It works, with a small change in the example to match the
string in my script (I had to customize it initially).

A quick workaround that I have just applied is to make sure that the
string does not contain /sendmail/ so it cannot be injected into syslog
via sendmail (may be injected some other way!).

Hope this helps while, a better solution is suggested.

Regards,
Ramon.

On Tue, 3 Jul 2001, Andrea Barisani wrote:

> Hi to all,
> 
[...]
> 
> The syslog string searched by the script is in this form for the qpop
> server
> 	
> /POP login by user \"[\-\_\w]+\" at \(.+\) ([0-9]\.]+)/)
> 
> On some cobalt raq3 servers (with the poprelayd add-on packet installed )  
> and in general on any system running the poprelayd script with sendmail is
> possible to "inject" this string in the syslog using sendmail logging. So
> anyone can insert a fake string with his own IP wich will be parsed by
> poprelayd and that will permit the use of sendmail as a relay.
> 
[...]
-----------------------------------------------------------------------------
       CIMAT                                 Ramon Reyes Carrion            
  Apdo. Postal 402                          e-mail:ramon@cimat.mx
36000 Guanajuato, Gto.                   Tel (52) (473) 27155 Ext 49571
      MEXICO                                 Fax (52) (473) 25749.
 http://www.cimat.mx/  

  




home help back first fref pref prev next nref lref last post